national security and counterterrorism” while a majority of the standard population finds them invasive and in breach of rights (Bergen). These claims of essentialness are, however, hard to argue for due in part to how secretive everything still is as well as the low turnouts reported from the programs. Although surveillance programs by the NSA have the possibility of discovering and halting terrorist activity, because of the breach of privacy and low actual rate of discoveries due to them, the creation and enforcement of such programs should be suspended. The first question on the minds of most of the people who don’t know much about what’s going on with these programs (which could theoretically be everyone if information about them is being withheld) is usually “What is being monitored and/or collected, and why?” According to the documents leaked by Snowden as well as information revealed by the NSA and other groups afterwards, information being collected, tracked, recorded, or otherwise monitored includes, but is not limited to: metadata of phone calls made within the U.S. (metadata in this sense includes the calling and receiving numbers and the length of the call), Emails,
national security and counterterrorism” while a majority of the standard population finds them invasive and in breach of rights (Bergen). These claims of essentialness are, however, hard to argue for due in part to how secretive everything still is as well as the low turnouts reported from the programs. Although surveillance programs by the NSA have the possibility of discovering and halting terrorist activity, because of the breach of privacy and low actual rate of discoveries due to them, the creation and enforcement of such programs should be suspended. The first question on the minds of most of the people who don’t know much about what’s going on with these programs (which could theoretically be everyone if information about them is being withheld) is usually “What is being monitored and/or collected, and why?” According to the documents leaked by Snowden as well as information revealed by the NSA and other groups afterwards, information being collected, tracked, recorded, or otherwise monitored includes, but is not limited to: metadata of phone calls made within the U.S. (metadata in this sense includes the calling and receiving numbers and the length of the call), Emails,